1.
A customer has Security Identity Manager configured in the environment. The customer wants to customize the Security Directory Server (SDS) schema to add some custom attributes in the HR feed due to the requirement from Security team while adding a new user in the organization. What is the recommended approach?
2.
A telecommunication company wants to reduce the costs of administering users and their accounts. The CEO is keen to gain cost savings by reducing the amount of work that the administrators must do. The areas identified where savings could be made include:
1. The effort required to reset passwords for users who have forgotten their passwords.
2. The effort required to manually create accounts when a person joins the company.
3. The effort required to add new accounts (and remove old accounts) when an employee changes job roles.
Which IBM security product would help this company to reduce administration cost involved in managing accounts?
3.
You are designing a network topology for IBM Security Web Gateway Appliance. The customer is using the appliance. Where do you place the appliance?
4.
A customer is using Microsoft Active Directory to manage access to all the applications in the organization. When an employee joins the organization, in order to set up his/her access to the applications through Active Directory, as a regular practice, the administrator would clone the Active Directory permissions from an existing employee in the same job role and assign it to the new employee. Over the years, employees have been changing their job roles within the organization. Whenever a job role change occurs, the same practice of cloning the access from an existing employee in the new job role is followed. As the AD permissions are cloned, the existing permissions for the employee changing the job role are not removed. What is the potential problem and solution for this customer?
5.
What is a pre-requisite when planning an IBM Security Access Manager for Enterprise Sign-On implementation?
6.
Which component of the IBM Security Access Manager for Web Appliance performs front end load balancing?
7.
What is the advantage of using a token based authentication model?
8.
A company wants a high-performance system for collecting, analyzing, archiving and storing large volumes of security event logs. Which IBM product will satisfy this need?
9.
You are tasked to design a web Single Sign-On solution to significantly reduce help desk costs. Which product would meet this requirement?
10.
Which operating system must be selected when creating a virtual machine to install IBM Security QRadar Log Manager V7.1?